Analysis

  • max time kernel
    141s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 01:25

General

  • Target

    442383819053791fd1d20cfedff61e4ddd39257d4c7644f1ef5cdd9695a52a28.exe

  • Size

    1023KB

  • MD5

    4252037a5918453642c6160143c906f7

  • SHA1

    a45397467231eb705ec646dd4c8fea40d4bc9d2d

  • SHA256

    442383819053791fd1d20cfedff61e4ddd39257d4c7644f1ef5cdd9695a52a28

  • SHA512

    f1ca8ea812c71c4bc0110d94c4f83f4cda8abb2ef7d3e7dac6e5449cd4b1fcfae0b7dce6a4e564a24509b36c64464cd0599a9978b03aa7632b0eb977d000281d

  • SSDEEP

    24576:vyEePqIKghHeloLGx0FsNjOCMTMVKlQ0SACPXdoq:6jq32vLCusNmYuZ6W

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

reiv

C2

193.233.20.33:4125

Attributes
  • auth_value

    5e0113277ad2cf97a9b7e175007f1c55

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\442383819053791fd1d20cfedff61e4ddd39257d4c7644f1ef5cdd9695a52a28.exe
    "C:\Users\Admin\AppData\Local\Temp\442383819053791fd1d20cfedff61e4ddd39257d4c7644f1ef5cdd9695a52a28.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4368
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina1628.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina1628.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4332
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina9575.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina9575.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4984
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8849.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8849.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4156
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu942894.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu942894.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4616
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor6886.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor6886.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1784
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dbl35s86.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dbl35s86.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4612
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en614579.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en614579.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4448
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge598260.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge598260.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3108
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4816
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4344
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3640
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4024
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:2848
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:3348
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4580
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:3988
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:4812
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:2588
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:1300

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                d261bdb8c831e7ca019d05a67e89419a

                SHA1

                363b3aed5b7cc287b0be0c494016dfb794730df9

                SHA256

                102412f7fb7b34d3fb4fff0dae568c8132af5fe822d555f02e94d1de02584319

                SHA512

                3207b8bef2e0b52f076085ac53097b3b0d9cd91df0dece56630ef66dda728a6c0cd88aadc60b8ffa7b62ec996e04d8bd40dce6cd0d97c63e85c29b88e9315115

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                d261bdb8c831e7ca019d05a67e89419a

                SHA1

                363b3aed5b7cc287b0be0c494016dfb794730df9

                SHA256

                102412f7fb7b34d3fb4fff0dae568c8132af5fe822d555f02e94d1de02584319

                SHA512

                3207b8bef2e0b52f076085ac53097b3b0d9cd91df0dece56630ef66dda728a6c0cd88aadc60b8ffa7b62ec996e04d8bd40dce6cd0d97c63e85c29b88e9315115

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                d261bdb8c831e7ca019d05a67e89419a

                SHA1

                363b3aed5b7cc287b0be0c494016dfb794730df9

                SHA256

                102412f7fb7b34d3fb4fff0dae568c8132af5fe822d555f02e94d1de02584319

                SHA512

                3207b8bef2e0b52f076085ac53097b3b0d9cd91df0dece56630ef66dda728a6c0cd88aadc60b8ffa7b62ec996e04d8bd40dce6cd0d97c63e85c29b88e9315115

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                d261bdb8c831e7ca019d05a67e89419a

                SHA1

                363b3aed5b7cc287b0be0c494016dfb794730df9

                SHA256

                102412f7fb7b34d3fb4fff0dae568c8132af5fe822d555f02e94d1de02584319

                SHA512

                3207b8bef2e0b52f076085ac53097b3b0d9cd91df0dece56630ef66dda728a6c0cd88aadc60b8ffa7b62ec996e04d8bd40dce6cd0d97c63e85c29b88e9315115

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                d261bdb8c831e7ca019d05a67e89419a

                SHA1

                363b3aed5b7cc287b0be0c494016dfb794730df9

                SHA256

                102412f7fb7b34d3fb4fff0dae568c8132af5fe822d555f02e94d1de02584319

                SHA512

                3207b8bef2e0b52f076085ac53097b3b0d9cd91df0dece56630ef66dda728a6c0cd88aadc60b8ffa7b62ec996e04d8bd40dce6cd0d97c63e85c29b88e9315115

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge598260.exe

                Filesize

                227KB

                MD5

                d261bdb8c831e7ca019d05a67e89419a

                SHA1

                363b3aed5b7cc287b0be0c494016dfb794730df9

                SHA256

                102412f7fb7b34d3fb4fff0dae568c8132af5fe822d555f02e94d1de02584319

                SHA512

                3207b8bef2e0b52f076085ac53097b3b0d9cd91df0dece56630ef66dda728a6c0cd88aadc60b8ffa7b62ec996e04d8bd40dce6cd0d97c63e85c29b88e9315115

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge598260.exe

                Filesize

                227KB

                MD5

                d261bdb8c831e7ca019d05a67e89419a

                SHA1

                363b3aed5b7cc287b0be0c494016dfb794730df9

                SHA256

                102412f7fb7b34d3fb4fff0dae568c8132af5fe822d555f02e94d1de02584319

                SHA512

                3207b8bef2e0b52f076085ac53097b3b0d9cd91df0dece56630ef66dda728a6c0cd88aadc60b8ffa7b62ec996e04d8bd40dce6cd0d97c63e85c29b88e9315115

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina1628.exe

                Filesize

                842KB

                MD5

                55f69cb44d22673d3298115c2c066162

                SHA1

                f74c887c00264195ba50c4eb5a2bac3af4e9a2a2

                SHA256

                06f5e648f01fb9cf6dd16ce13f974b95e59e85807a8ad6cdc923987fd3046a90

                SHA512

                816998ef1b4391b0b4b1742c568a1c32e907d6f57ecb8f40eb132628081b917a5225b08b953ed64eb053d40ad10f4886296b934c58287e4a7da3d1740fc5b945

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina1628.exe

                Filesize

                842KB

                MD5

                55f69cb44d22673d3298115c2c066162

                SHA1

                f74c887c00264195ba50c4eb5a2bac3af4e9a2a2

                SHA256

                06f5e648f01fb9cf6dd16ce13f974b95e59e85807a8ad6cdc923987fd3046a90

                SHA512

                816998ef1b4391b0b4b1742c568a1c32e907d6f57ecb8f40eb132628081b917a5225b08b953ed64eb053d40ad10f4886296b934c58287e4a7da3d1740fc5b945

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en614579.exe

                Filesize

                175KB

                MD5

                7e2872cb5916680fee9e3458c2ad651d

                SHA1

                f8c9380eb4b703e077793c9cc7cb27afc8eb0fa7

                SHA256

                3703b7a6716594e60e0e0edf081183aa707ab2e76b8d20f51d5aa98d9fa2c44f

                SHA512

                f12aa07ea9625b07e94efaf3780251b63d93a1b76adf7e0d8055f747768136206acecfb0d3c8340b8c4de4049f456b139f1fbaf754f04ea9ccc3d7ffd2df3b9c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en614579.exe

                Filesize

                175KB

                MD5

                7e2872cb5916680fee9e3458c2ad651d

                SHA1

                f8c9380eb4b703e077793c9cc7cb27afc8eb0fa7

                SHA256

                3703b7a6716594e60e0e0edf081183aa707ab2e76b8d20f51d5aa98d9fa2c44f

                SHA512

                f12aa07ea9625b07e94efaf3780251b63d93a1b76adf7e0d8055f747768136206acecfb0d3c8340b8c4de4049f456b139f1fbaf754f04ea9ccc3d7ffd2df3b9c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina9575.exe

                Filesize

                700KB

                MD5

                22bed738be095b60319070a4c62f9e6f

                SHA1

                82daeff75c66e6ee812be7f88517dd813ba7f3f5

                SHA256

                a79c13be6d5c0abb8c82ba6fdaa6eb8420325d665a1d24824a7e6eea7bad3860

                SHA512

                22a68a59e9802e1a012a4488a89461a074eac57589607bcd44de6047461960980769fa2aa7c3d590eb6a3858b7dc2e8db78ffc3427ddf434c17ccaa5973b573f

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina9575.exe

                Filesize

                700KB

                MD5

                22bed738be095b60319070a4c62f9e6f

                SHA1

                82daeff75c66e6ee812be7f88517dd813ba7f3f5

                SHA256

                a79c13be6d5c0abb8c82ba6fdaa6eb8420325d665a1d24824a7e6eea7bad3860

                SHA512

                22a68a59e9802e1a012a4488a89461a074eac57589607bcd44de6047461960980769fa2aa7c3d590eb6a3858b7dc2e8db78ffc3427ddf434c17ccaa5973b573f

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dbl35s86.exe

                Filesize

                359KB

                MD5

                ff8e838b39548285a0f2e9d4777c9ec0

                SHA1

                a84c7e1a4f821cf27015137bd2c88f1f1b9d8751

                SHA256

                39ec013562bd764d28fc3946be960d00c4d89d05923e5a5bacb02905b7e303ed

                SHA512

                8e5f87a67e7f250282e213d251eec605ab524f0d857d5f84b8f9759083d6d0d7dd60bb0738075ec8c0ff32c0d08c9937387dc6c75833ac841daca487bec01dd1

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dbl35s86.exe

                Filesize

                359KB

                MD5

                ff8e838b39548285a0f2e9d4777c9ec0

                SHA1

                a84c7e1a4f821cf27015137bd2c88f1f1b9d8751

                SHA256

                39ec013562bd764d28fc3946be960d00c4d89d05923e5a5bacb02905b7e303ed

                SHA512

                8e5f87a67e7f250282e213d251eec605ab524f0d857d5f84b8f9759083d6d0d7dd60bb0738075ec8c0ff32c0d08c9937387dc6c75833ac841daca487bec01dd1

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8849.exe

                Filesize

                347KB

                MD5

                ecd2e151e5bcbf4c7106ae64bff48d97

                SHA1

                a0fce67caf5ec61847e113093bda1708eaebedfc

                SHA256

                dee94ab111ff72e41a889e6d2fb50e34f8473451ee595e2c6d830935a83c152b

                SHA512

                6e04df715eaea2ce1f65ff67d6e8d80b0a1bcf6f6abdba4874cc50b4ea51053907a96ba4faa4ec9c2f9be1a8526a6a9255fc54029fb0561e9f7f39f49cfd8639

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8849.exe

                Filesize

                347KB

                MD5

                ecd2e151e5bcbf4c7106ae64bff48d97

                SHA1

                a0fce67caf5ec61847e113093bda1708eaebedfc

                SHA256

                dee94ab111ff72e41a889e6d2fb50e34f8473451ee595e2c6d830935a83c152b

                SHA512

                6e04df715eaea2ce1f65ff67d6e8d80b0a1bcf6f6abdba4874cc50b4ea51053907a96ba4faa4ec9c2f9be1a8526a6a9255fc54029fb0561e9f7f39f49cfd8639

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu942894.exe

                Filesize

                12KB

                MD5

                90e638b70c9ef7058d96f81c6b31a958

                SHA1

                1b2379495c39301447e153c32eeefc7838221fb2

                SHA256

                b2be0a427d8ecf51104b2b8efb480e694b06d5cc9a78aa31cc4d946535e82573

                SHA512

                9d5274afb8efb36e8947a71796c2d3cc48f26d27601c66fcd3f82fcca4e78b676b5670b10f31830efd8b0fbc850834ca0e392b3c1a6105ad6a20b7fb02848d27

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu942894.exe

                Filesize

                12KB

                MD5

                90e638b70c9ef7058d96f81c6b31a958

                SHA1

                1b2379495c39301447e153c32eeefc7838221fb2

                SHA256

                b2be0a427d8ecf51104b2b8efb480e694b06d5cc9a78aa31cc4d946535e82573

                SHA512

                9d5274afb8efb36e8947a71796c2d3cc48f26d27601c66fcd3f82fcca4e78b676b5670b10f31830efd8b0fbc850834ca0e392b3c1a6105ad6a20b7fb02848d27

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor6886.exe

                Filesize

                300KB

                MD5

                09219d315c2eb0058d5c607748f86693

                SHA1

                83a4aa986c039ca679f8fe7d97d705111b8c6748

                SHA256

                a8053f20ce393ead359d80564d5e9fed9413084cbada22f523528c4491920365

                SHA512

                42452195fbeab68f4fee4125d5d139b83170732e6045a46cef03ecce4ea93d2ddc21bd4c80999d07688cd7aaf3faa532106c17b8b8c09831f0e0c16549f10b2b

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor6886.exe

                Filesize

                300KB

                MD5

                09219d315c2eb0058d5c607748f86693

                SHA1

                83a4aa986c039ca679f8fe7d97d705111b8c6748

                SHA256

                a8053f20ce393ead359d80564d5e9fed9413084cbada22f523528c4491920365

                SHA512

                42452195fbeab68f4fee4125d5d139b83170732e6045a46cef03ecce4ea93d2ddc21bd4c80999d07688cd7aaf3faa532106c17b8b8c09831f0e0c16549f10b2b

              • memory/1784-188-0x0000000002770000-0x0000000002782000-memory.dmp

                Filesize

                72KB

              • memory/1784-202-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

                Filesize

                64KB

              • memory/1784-189-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

                Filesize

                64KB

              • memory/1784-181-0x0000000002770000-0x0000000002782000-memory.dmp

                Filesize

                72KB

              • memory/1784-191-0x0000000002770000-0x0000000002782000-memory.dmp

                Filesize

                72KB

              • memory/1784-187-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

                Filesize

                64KB

              • memory/1784-184-0x00000000009D0000-0x00000000009FD000-memory.dmp

                Filesize

                180KB

              • memory/1784-183-0x0000000002770000-0x0000000002782000-memory.dmp

                Filesize

                72KB

              • memory/1784-193-0x0000000002770000-0x0000000002782000-memory.dmp

                Filesize

                72KB

              • memory/1784-195-0x0000000002770000-0x0000000002782000-memory.dmp

                Filesize

                72KB

              • memory/1784-197-0x0000000002770000-0x0000000002782000-memory.dmp

                Filesize

                72KB

              • memory/1784-199-0x0000000002770000-0x0000000002782000-memory.dmp

                Filesize

                72KB

              • memory/1784-200-0x0000000000400000-0x000000000070E000-memory.dmp

                Filesize

                3.1MB

              • memory/1784-186-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

                Filesize

                64KB

              • memory/1784-203-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

                Filesize

                64KB

              • memory/1784-204-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

                Filesize

                64KB

              • memory/1784-205-0x0000000000400000-0x000000000070E000-memory.dmp

                Filesize

                3.1MB

              • memory/1784-179-0x0000000002770000-0x0000000002782000-memory.dmp

                Filesize

                72KB

              • memory/1784-177-0x0000000002770000-0x0000000002782000-memory.dmp

                Filesize

                72KB

              • memory/1784-175-0x0000000002770000-0x0000000002782000-memory.dmp

                Filesize

                72KB

              • memory/1784-173-0x0000000002770000-0x0000000002782000-memory.dmp

                Filesize

                72KB

              • memory/1784-171-0x0000000002770000-0x0000000002782000-memory.dmp

                Filesize

                72KB

              • memory/1784-169-0x0000000002770000-0x0000000002782000-memory.dmp

                Filesize

                72KB

              • memory/1784-168-0x0000000002770000-0x0000000002782000-memory.dmp

                Filesize

                72KB

              • memory/1784-167-0x0000000004ED0000-0x0000000005474000-memory.dmp

                Filesize

                5.6MB

              • memory/4448-1141-0x0000000005230000-0x0000000005240000-memory.dmp

                Filesize

                64KB

              • memory/4448-1140-0x0000000000650000-0x0000000000682000-memory.dmp

                Filesize

                200KB

              • memory/4612-217-0x00000000052F0000-0x000000000532E000-memory.dmp

                Filesize

                248KB

              • memory/4612-231-0x00000000052F0000-0x000000000532E000-memory.dmp

                Filesize

                248KB

              • memory/4612-233-0x00000000052F0000-0x000000000532E000-memory.dmp

                Filesize

                248KB

              • memory/4612-235-0x00000000052F0000-0x000000000532E000-memory.dmp

                Filesize

                248KB

              • memory/4612-237-0x00000000052F0000-0x000000000532E000-memory.dmp

                Filesize

                248KB

              • memory/4612-240-0x0000000000870000-0x00000000008BB000-memory.dmp

                Filesize

                300KB

              • memory/4612-239-0x00000000052F0000-0x000000000532E000-memory.dmp

                Filesize

                248KB

              • memory/4612-241-0x0000000002840000-0x0000000002850000-memory.dmp

                Filesize

                64KB

              • memory/4612-244-0x0000000002840000-0x0000000002850000-memory.dmp

                Filesize

                64KB

              • memory/4612-246-0x0000000002840000-0x0000000002850000-memory.dmp

                Filesize

                64KB

              • memory/4612-243-0x00000000052F0000-0x000000000532E000-memory.dmp

                Filesize

                248KB

              • memory/4612-247-0x00000000052F0000-0x000000000532E000-memory.dmp

                Filesize

                248KB

              • memory/4612-1120-0x0000000005470000-0x0000000005A88000-memory.dmp

                Filesize

                6.1MB

              • memory/4612-1121-0x0000000005B00000-0x0000000005C0A000-memory.dmp

                Filesize

                1.0MB

              • memory/4612-1122-0x0000000005C40000-0x0000000005C52000-memory.dmp

                Filesize

                72KB

              • memory/4612-1123-0x0000000005C60000-0x0000000005C9C000-memory.dmp

                Filesize

                240KB

              • memory/4612-1124-0x0000000002840000-0x0000000002850000-memory.dmp

                Filesize

                64KB

              • memory/4612-1125-0x0000000005F50000-0x0000000005FB6000-memory.dmp

                Filesize

                408KB

              • memory/4612-1126-0x0000000006620000-0x00000000066B2000-memory.dmp

                Filesize

                584KB

              • memory/4612-1128-0x0000000006A10000-0x0000000006BD2000-memory.dmp

                Filesize

                1.8MB

              • memory/4612-1129-0x0000000006BF0000-0x000000000711C000-memory.dmp

                Filesize

                5.2MB

              • memory/4612-1131-0x0000000002840000-0x0000000002850000-memory.dmp

                Filesize

                64KB

              • memory/4612-1130-0x0000000002840000-0x0000000002850000-memory.dmp

                Filesize

                64KB

              • memory/4612-1132-0x0000000002840000-0x0000000002850000-memory.dmp

                Filesize

                64KB

              • memory/4612-1133-0x0000000007250000-0x00000000072C6000-memory.dmp

                Filesize

                472KB

              • memory/4612-229-0x00000000052F0000-0x000000000532E000-memory.dmp

                Filesize

                248KB

              • memory/4612-227-0x00000000052F0000-0x000000000532E000-memory.dmp

                Filesize

                248KB

              • memory/4612-225-0x00000000052F0000-0x000000000532E000-memory.dmp

                Filesize

                248KB

              • memory/4612-223-0x00000000052F0000-0x000000000532E000-memory.dmp

                Filesize

                248KB

              • memory/4612-221-0x00000000052F0000-0x000000000532E000-memory.dmp

                Filesize

                248KB

              • memory/4612-219-0x00000000052F0000-0x000000000532E000-memory.dmp

                Filesize

                248KB

              • memory/4612-215-0x00000000052F0000-0x000000000532E000-memory.dmp

                Filesize

                248KB

              • memory/4612-213-0x00000000052F0000-0x000000000532E000-memory.dmp

                Filesize

                248KB

              • memory/4612-211-0x00000000052F0000-0x000000000532E000-memory.dmp

                Filesize

                248KB

              • memory/4612-210-0x00000000052F0000-0x000000000532E000-memory.dmp

                Filesize

                248KB

              • memory/4612-1134-0x00000000072E0000-0x0000000007330000-memory.dmp

                Filesize

                320KB

              • memory/4616-161-0x0000000000F20000-0x0000000000F2A000-memory.dmp

                Filesize

                40KB